Access control in the Internet of Things: Big challenges and new opportunities

A Ouaddah, H Mousannif, A Abou Elkalam… - Computer Networks, 2017 - Elsevier
In this paper, an extensive state of the art review of different access control solutions in IoT
within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An …

Machine learning enabled industrial iot security: Challenges, trends and solutions

C Ni, SC Li - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract Introduction: The increasingly integrated Industrial IoT (IIoT) with industrial systems
brings benefits such as intelligent analytics, predictive maintenance, and remote monitoring …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

An access control model for cloud computing

YA Younis, K Kifayat, M Merabti - Journal of Information Security and …, 2014 - Elsevier
Cloud computing is considered one of the most dominant paradigms in the Information
Technology (IT) industry these days. It offers new cost effective services on-demand such as …

[HTML][HTML] Practical access control for sensor networks in the context of the Internet of Things

F Li, Y Han, C Jin - Computer Communications, 2016 - Elsevier
Wireless sensor network (WSN) plays an important role in military sensing and tracking,
target tracking, and environment monitoring. To query of the network to get useful …

A survey on empirical security analysis of access-control systems: a real-world perspective

S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …

Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

Developing an adaptive Risk-based access control model for the Internet of Things

HF Atlam, A Alenezi, RJ Walters… - … on internet of things …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) is creating a revolution in the number of connected devices.
Cisco reported that there were 25 billion IoT devices in 2015 and modest estimation that this …

A survey on access control mechanisms for cloud computing

R El Sibai, N Gemayel, J Bou Abdo… - Transactions on …, 2020 - Wiley Online Library
Cloud computing is an Internet‐based computing where the information technology
resources are provided to end users following their request. With this technology, users and …

Access control for cyber-physical systems interconnected to the cloud

J Lopez, JE Rubio - Computer Networks, 2018 - Elsevier
The continuous advance in manufacturing and information analytics has improved the
connectivity between computational and physical elements within the industry, hence …